General
-
Target
769ecf4583f8293d51951d4fbac9ae1f1e54cef1e0993722f3bc64892494737a
-
Size
66KB
-
Sample
240820-nvgfzstejp
-
MD5
4558d1929b88f8faacd2316d326dd3ec
-
SHA1
24ae71aa9a46a21ab7f263649f7ca6bd355ffc42
-
SHA256
769ecf4583f8293d51951d4fbac9ae1f1e54cef1e0993722f3bc64892494737a
-
SHA512
68ede3a953802d8885e1e4143cf51ed96a217569097efe937ffa19c79a79918261f2b8a49ad51c7b8af8659b0d6524fcbcdce9781004fcc5f042b864fb5505a2
-
SSDEEP
1536:/d+eky9Mx9dNEjDBp29jQRNIUuG/1TsKJswDVndUEL5DEL:/d1vO+Bp21QrIUx/1MwddUEREL
Static task
static1
Behavioral task
behavioral1
Sample
BL_Awb_Shipping_Invoice_doc_001900720242247820020031808174CN20003190072024.vbs
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
BL_Awb_Shipping_Invoice_doc_001900720242247820020031808174CN20003190072024.vbs
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
BL_Awb_Shipping_Invoice_doc_001900720242247820020031808174CN20003190072024.vbs
-
Size
140KB
-
MD5
58d33bad4955326610f6c2c6d5e06c12
-
SHA1
87984bcb2dc81a3bfcbdc8b21053547eaa4cb1ad
-
SHA256
d48c32bf817ba6547c83ce46e3d49e1ff8665275f5e4e8362b6303b46dd2e315
-
SHA512
8c7addc6600fd431cb952b517760e3ad71d6ef887b550d8ff22518de80cedfbc4872a5d93b5bd350b464a45de0e53450a6137a3992576688aad3788132ed367f
-
SSDEEP
3072:vjGO63YDSdYB51Gy/ABuIWHwxoH0sHXaHb0bIkNTEx29OjmUUe:rGO63WSdYB51Gy/quNHwaHdHqHb0bIkO
Score8/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1